CSCI 3200: Ethics in Computer Science - Quizzes 4-6

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/122

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

123 Terms

1
New cards

Which violation of a trademark occurs when the mark is portrayed in a negative or compromising way?
A. Infringement
B. Unfair competition
C. Blurring
D. Tarnishment

Tarnishment

2
New cards

argued that property was an expression of one's personality, a means of self-actualization.
A. Hegel
B. Locke
C. Cohen
D. Moore

Hegel

3
New cards

True or False? Copyright law does not give the copyright holder the right to prepare derivative works based upon the copyrighted work.

False

4
New cards

Copyright laws allow for _____ where copyrighted literary works can be quoted and a small segment of a video work can be displayed for limited purposes such as classroom instruction.

fair use

5
New cards

To be eligible for a(n) the invention must be a process, machine, or composition of matter that is unknown or unused by others before being awarded.

patent

6
New cards

T/F: The National Foundation Copyright Act criminalizes the use of technologies that circumvent technical protection systems such as an encryption program.

False

7
New cards

T/F: Kant argues that users should be given broader fair use rights in order to blunt the encroachment of a permission culture.

False

8
New cards

T/F: Intellectual property rights last for 30 years after the author has passed away.

False

9
New cards

T/F: Consumers can engage in fair use, a process of making a copy of a song to listen to at another time.

False

10
New cards

T/F: Unfair competition occurs when the trademark is portrayed in a negative or compromising way.

False

11
New cards

True or False? Parody of trademarks is permitted as long as it is not closely connected with commercial use.

True

12
New cards

The Copyright Term Extension Act extends the term for copyright protection another _____ years.

20

13
New cards

An issue that had not been fully addressed in prior acts, but was singled out in the Digital Millennium Copyright Act, is the _____ liability, the liability of third parties for copyright infringement of others.

intermediary

14
New cards

To state the _____ theory more simply, we should provide enough intellectual property protection to serve as an inducement for future innovation.

utilitarian

15
New cards

Which of the following is not an example of intellectual property?
A. Original music compositions
B. Novels
C. Ideas
D. Product formulas

Ideas

16
New cards

T/F: Copyrights now last for an author's lifetime plus 70 years.

True

17
New cards

Creating a program to unscramble a DVD file's encryption protection system so a user can copy the movie to a computer hard drive is a violation of the:
A. Communications Decency Act.
B. Online Protection Act.
C. Digital Millennium Copyright Act.
D. Copyright Term Extension Act.

Digital Millennium Copyright Act.

18
New cards

True or False? According to Stallman, the patent and copyright protection regime interferes with the evolution and incremental improvement of software products. Therefore, it causes an enormous disincentive and keeps users from enjoying many popular programs.

True

19
New cards

True or False? The open source code approach leads to the development of better software code, and in recent year many major software vendors are making their code more openly accessible.

True

20
New cards

is software such as Adobe's Acrobat Reader that is distributed with the source code at no charge.

Freeware

21
New cards

A(n) _____ license allows a user to redistribute the open source code with modifications or enhancements, but only under the same open source license under which that user received that code.

copyleft

22
New cards

_____ is a combination of what rights (to use, copy, or edit) users of the work will have.
A. The Communications Decency Act
B. The Digital Millennium Copyright Act
C. The Cyberspace Rights Act
D. Digital rights management

Digital rights management

23
New cards

Which of the following is a problem with digital rights management?
A. Fair use conflicts with trusted systems
B. Invasions of privacy
C. Creative works may be less accessible
D. All of these are correct.

All of these are correct.

24
New cards

T/F: It is legal to make extra copies of MP3 files as backups and distribute them to friends.

False

25
New cards

T/F: Given the large number of patents, it is difficult for innovators to know when or if they have inadvertently infringed on a competitor's patent.

True

26
New cards

T/F: A freeware license allows a user to redistribute the open source code with modifications or enhancements, but only under the same open source license under which that user received that code.

False

27
New cards

True or False? A supernode is a user computer selected by the software provider that has enough power to store the index of available music and provide search capabilities.

True

28
New cards

True or False? The State Street case provided grounds for giving business methods a patent for being novel and nonobvious, which then made it possible for software-enabled businesses to receive patents.

True

29
New cards

Because MP3 files are unsecured, they can be distributed easily through the internet and lead to the potential for , the illegal copying and distributing of music.

piracy

30
New cards

When someone registers a domain name like googlesucks.com, the practice is referred to as _____.

cyber griping

31
New cards

Because many of the new business patents were for online business methods, they became known as

Cyberpatents

32
New cards

A prominent technology that gives content providers enhanced control over their material is known as , where content providers distribute work in cyberspace in an encrypted form accessible only by users with this type of hardware or software.

trusted systems

33
New cards

T/F: P2P software gets around copyright infringement because it uses a functionality called uploading from a database stored in a supercomputer.

False

34
New cards

T/F: Software is a functional form of intellectual property that cannot be protected by a patent or copyright.

False

35
New cards

Gavison defines privacy as all of the following, except:
A. secrecy.
B. anonymity.
C. free will.
D. solitude.

free will.

36
New cards

True or False? Natural privacy means that if you are sitting in a secluded island off the coast of a continent and someone discovers you, you have lost your privacy, but you couldn't reasonably claim that your privacy rights have somehow been violated.

True

37
New cards

Individuals need over their personal data to ensure restricted access to it.

Control

38
New cards

Which element of privacy refers to protection from undesired attention?
A. Secrecy
B. Anonymity
C. Free will
D. Solitude

Anonymity

39
New cards

T/F: Privacy is defined as a condition or state of limited accessibility.

True

40
New cards

T/F: Privacy in cyberspace is tricky because a person who wants privacy is seeking restricted access, but that condition no longer exists when someone observes them or otherwise intrudes upon their private space.

True

41
New cards

T/F: The concept of privacy and the normative justification for a right of privacy are the same concepts.

False

42
New cards

True or False? Online databases should exclude vital information such as social security numbers, but not personal identities such as mother's maiden names.

False

43
New cards

T/F: Internet databases purge data 15 years after it has been posted to prevent overloading of the internet's supercomputers.

False

44
New cards

T/F: Businesses would greatly benefit from building databases because court records and other public records have been digitized and made available on the Web.

True

45
New cards

T/F: A major issue concerning the government making public records such a court records available on the internet is that others can then access this highly sensitive material without owner knowledge or consent.

True

46
New cards

T/F: Hypothetically, because public records are posted on the internet, you could find out major facts about someone you work with without their knowledge within 15 minutes.

True

47
New cards

True or False? Electronic commerce transactions are particularly problematic because they often leave a revealing trail of personally identifiable information, including one's name, address, email address, and phone number.

True

48
New cards

True or False? It is illegal for online sites to sell demographic data such as one's age or gender to marketers.

False

49
New cards

A(n) _____ is placed across a network of related sites so that users' movements can be tracked not just within a certain site but within any site that is part of this network.

Third party cookie

50
New cards

T/F: Acxiom Corp. is an information service provider that has a database of information on 103 million people in the United States, which they sell to junk mail vendors for 25 cents a name.

False

51
New cards

T/F: Facebook can track a user's online movements even when the user is not logged in to Facebook.

True

52
New cards

_____ are small data files that are written and stored on the user's hard disk drive by a website to track the user when the user visits that site.

Cookies

53
New cards

The _____ approach for protecting consumer privacy is when individuals explicitly approve secondary uses of their personal data.

Opt-in

54
New cards

This type of tracking system is installed on a user's computer and can track a web surfer's location and online activities.
A. Beacon
B. Cookie
C. Tor
D. Regulator

Beacon

55
New cards

What is the primary objective behind private data collection and surveillance?
A. Targeted marketing
B. Personalized advertising
C. Government surveillance
D. Targeted marketing and personalized advertising

Targeted marketing and personalized advertising

56
New cards

T/F: Corporations such as Metromail search public records both on and offline to build "Big Data" dossiers on consumers such as the make and model of their cars.

False

57
New cards

T/F: It is illegal to create apps for smartphones and other mobile devices to gather data and then sell that data to marketers.

False

58
New cards

This type of controversial tracking system, a(n) , is placed across a network of related sites so that the movements of users can be tracked not just on the initial site but on all related sites of that network.

third-party cookie

59
New cards

T/F: When you shop at a store such as Sears, and use your Sears card, purchase data is sent to producers showing your shopping habits so they can plan marketing campaigns.

True

60
New cards

T/F: The collection, aggregation, and analysis of information to sell to marketers is known as Big Data.

True

61
New cards

True or False? The sale of motor vehicle record information to third parties was a lucrative business for many states.

True

62
New cards

True or False? A key piece of the Health Insurance Portability and Accountability Act is the restriction to limit the disclosure of health information to the minimum necessary for a specific purpose such as paying bills.

True

63
New cards

The Federal Trade Commission is responsible for enforcing the _____, which regulates and restricts disclosures of credit and financial information by credit bureaus.
A. Right to Financial Privacy Act
B. Digital Rights Management Act
C. Direct Marketing Act
D. Fair Credit Reporting Act

Fair Credit Reporting Act

64
New cards

Congress passed the ___, which forbids websites from collecting personal information from children under age 13 without parental consent.
A. Communications Decency Act
B. Children's Online Privacy Protection Act
C. Children's Internet Protection Act
D. Children's Online Protection Act

Children's Online Privacy Protection Act

65
New cards

In this landmark court case involving the dissemination of birth control information, the Justices agreed that privacy was a right so rooted in the traditions and conscience of our people as to be ranked as a fundamental right.
A. MGM v. Grokster
B. Universal City v. Remeirdes
C. Alice Corp. Ltd v. Maryland
D. Griswold v. Connecticut

Griswold v. Connecticut

66
New cards

T/F: The United States uses targeted regulations that protect privacy rights in certain sectors such as health care instead of comprehensive laws.

True

67
New cards

T/F: According to the Federal Trade Commission, a consumer's credit report should be released or provided to a third party only in response to a court order, in response to a written request from the consumer who is the subject of the report, or in response to responsible third parties who intend to use the information.

False

68
New cards

True or False? In contrast to the constitutions of most European states, there is no right to privacy in the U.S. Constitution.

True

69
New cards

advocates "just aggregation" principles that would preserve the "spatial disconnects" that separate one context from another.
A. Nissenbaum
B. Cohen
C. Rosen
D. Moor

Cohen

70
New cards

_____ states that the recipients of digital information matter—it makes a big difference whether you share information with a neighbor, a group of friends, colleagues at work, or a data broker who can recombine that data with other information.
A. Nissenbaum
B. Cohen
C. Rosen
D. Moor

Nissenbaum

71
New cards

T/F: Digital information is the currency of the new economy, and there is too much market incentive to commoditize information even when privacy may be compromised.

True

72
New cards

T/F: Because of the culture and political traditions, Europe does not like the idea of blunt solutions for regulating privacy on the Web.

False

73
New cards

True or False? It is illegal for companies to monitor their employee's incoming and outgoing email.

False

74
New cards

True or False? The main difference between Europe and the United States regarding employee privacy is the U.S. weighs the value of privacy against other concerns and Europe values human dignity.

True

75
New cards

_____ has a Workers Statute that "prohibits remote surveillance of workers by video camera or other devices," unless agreed to by the union for the sake of a business necessity; even then, a worker has the right to challenge the surveillance.
A. Germany
B. Italy
C. France
D. England

Italy

76
New cards

T/F: The internet has played a key role in allowing corporations to expedite the interorganizational communication and data flows.

True

77
New cards

T/F: Some employers check the whereabouts of their employees through electronic monitoring and maintain health surveillance databanks.

True

78
New cards

_____ is when an email is sent to a user that looks authentic but takes them to a link where they are asked to enter sensitive personal information.

Phishing

79
New cards

T/F: The Stuxnet worm is a popular form of malware used to insert corrupt information into a computer.

False

80
New cards

T/F: The famous Stuxnet worm undermined North Korea's Nuclear Research program.

False

81
New cards

T/F: What makes the Net such an easy tool for terrorists is that the Net's underlying architecture is a radically open one, designed to share information and not to conceal it.

True

82
New cards

A(n) is a self-replicating program usually hidden away in another host program or file that can disrupt a computer.

Virus

83
New cards

_____ travel automatically from one computer to another across network connections.

Worms

84
New cards

All of the following are categories of cybercrime, except:
A. computer sabotage.
B. electronic break-ins.
C. software piracy.
D. privacy violations.

privacy violations.

85
New cards

The Pentagon's Joint Strike Fighter project was a cybercrime act that fell into which category?
A. Computer sabotage
B. Electronic break-ins
C. Software piracy
D. Privacy violations

Electronic break-ins

86
New cards

The two types of malware that form ransomware are the designed to spread from one computer to another and the _____ that is delivered by it. Note: Separate the two answers with a semicolon (;).

worm; encrypting software

87
New cards

T/F: Computer-related crimes are ones committed with cybertechnology and fall into categories of fraud, swindling, or embezzlement.

True

88
New cards

Which ransomware program affected 230,000 computers within 48 hours, including those at large companies and government agencies?
A. Strike Fighter
B. WannaCry
C. Mr. Dotcom
D. Osiris

WannaCry

89
New cards

T/F: The No Electronic Theft Act of 1997 involves the unauthorized distribution of computer parts.

False

90
New cards

T/F: The No Electronic Theft Act of 1997 forbids the willful infringement of a copyright for purposes of commercial advantage or for some financial gain.

True

91
New cards

T/F: A denial-of-service attack is when computers link up and steal user names and passwords from around the world and switch them with other users.

False

92
New cards

_____ involves the unauthorized duplication of proprietary software and the distribution or making available of those copies over the network.

Software piracy

93
New cards

True or False? The process of solving social problems with technology must be firmly guided by government regulations, and in the case of music or video, an awareness of the consumer's right to make backup copies or to use a piece of content on diverse platforms (a Mac computer system, an iPhone, etc.).

False

94
New cards

Embedded in iTunes is a Digital Rights Management tool called that limits the distribution of iTunes music.

fairplay

95
New cards

T/F: The government responded to Hollywood's request to protect their products by passing new laws forbidding the creation, sale, or distribution of any interactive device that does not include and utilize certified security technologies.

True

96
New cards

T/F: The success of the music tool MP3.com restored confidence to the music world that digital music can still be successfully distributed through traditional market mechanisms.

False

97
New cards

True or False? A combination of law and code in Mac and PC device designs forbidding the copying of music and videos is an inexpensive fix that will stop all forms of piracy.

False

98
New cards

T/F: Hollywood and the music content industry are frustrated that coders have not found a copyright protection code to prevent bootlegging of their products.

True

99
New cards

True or False? It is a state-statute crime to cause the transmission of a program or piece of code that intentionally causes damage to a protected computer.

False

100
New cards

A(n) _____ combines hacking and political activism.

hacktivist